期刊文献+

Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose

Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose
下载PDF
导出
摘要 In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are put to the decryption algorithm. This notion is aimed for the following anti-forensics purpose: the attacker can cheat the forensics investigator by decrypting an encrypted file to a meaningful file other than that one he encrypted, in the case that he is caught by the forensics investigator and ordered to hand over the key for decryption. We then present a construction of secure disguisable symmetric encryption schemes.
出处 《China Communications》 SCIE CSCD 2010年第6期56-63,共8页 中国通信(英文版)
关键词 symmetric encryption OBFUSCATION ANTI-FORENSICS 加密方案 对称加密 伪装 外商投资企业 解密算法 文件加密 文件解密 攻击者
  • 相关文献

参考文献10

  • 1BARAK B, GOLDREICH O, IMPAGLIAZZO R, et al. On the (Im)possbility of Obfuscating Programs [ C]// Proceedings of CRYPTO 2001, LNCS 2139. Springer, Berlin, 2001: 1-18.
  • 2BERGHEL H. Hiding Data, Forensics, and Anti-forensics[J]. Communications of the ACM, 2007, 50(4): 15-20.
  • 3CANETTI R. Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information[C]// Proceedings of Crypto 1997, LNCS 1294. Springer, Berlin, 1997: 455-469.
  • 4CANETTI R, DAKDOUK R. Obfuscating Point Functions With Multibit Output [ C ]// Proceedings of EUROCRYPT'08, LNCS 4965. Springer, Berlin, 2008: 489- 508.
  • 5CANETTI R, MICCIANCIO D, REINGOLD O. Perfectly One-way Probabilistic Hash Functions [C]// Proceedings of STOC'98, ACM. New York, 1998: 131-140.
  • 6CABRERA J B D, LEWIS L, MEHARA R. Detection and Classification of Intrusion and Faults Using Sequences of System Calls [J]. ACM SIGMOD Record, 2001, 30(4): 25 -34.
  • 7GARFINKEL S. Anti-forensics: Techniques, Detection and Countermeasures [ C ]// Proceedings of 2nd International Conference on i-Warfare and Security (ICIW), ACI, 2007:8-9.
  • 8GOLDREICH O. Foundations of Cryptography, Basic Tools[M]. Cambridge University Press, 2001.
  • 9MOHAY G M, ANDERSON A, COLLIE B, et al. Computer and Intrusion Forensics [M]. Artech House, Inc., Norwood, MA, USA, 2003.
  • 10WEE H. On Obfuscating Point Functions[ C]// Proceedings of STOC'05, ACM, New York, 2005: 523-532.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部